Cybersecurity

Article

Government's Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process

Authors: Ari Schwartz and Robert K. Knake
Belfer Center for Science and International Affairs John F. Kennedy School of Government Harvard University

In this June 2016 discussion paper, Knake and his coauthor examine the Obama administration’s Vulnerability Equities Process guidelines. They argue that the administration ought to formalize and publicize these guidelines and offer policy recommendations to improve the VEP while maintaining a bias toward public disclosure of zero day vulnerabilities.

See more in Global; Cybersecurity

Article

Can the United States and China De-conflict in Cyberspace?

Authors: Adam Segal and Tang Lan
War on the Rocks

In spite of significant differences in views, Beijing and Washington appear committed to not letting cyber issues derail the U.S.-China relationship or interfere with cooperation on other high-profile issues. Among the wide range of issues raised at their recent meeting on the sidelines of the Nuclear Security Summit, Presidents Barack Obama and Xi Jinping reiterated their commitment to last September’s breakthrough cybersecurity agreement.

See more in China; United States; Cybersecurity

Article

Reducing and Managing U.S.-China Conflict in Cyberspace

Authors: Adam Segal and Tang Lan
The National Bureau of Asian Research

While there continue to be significant differences between the perspectives of the U.S. and Chinese governments on issues in cyberspace, recent progress to overcome these challenges suggests a path forward, writes Adam Segal. Substantive cooperation on cybersecurity, cybercrime, and Internet governance can help both countries avoid a conflict over cyberspace.

See more in United States; China; Cybersecurity

Op-Ed

How to Break the Deadlock Over Data Encryption

Authors: Adam Segal and Alexandre Grigsby
Washington Post

See more in United States; Cybersecurity

Other Report

Protecting Data Privacy With User-Friendly Software

Author: Sara "Scout" Sinclair Brody

Protecting the privacy of user data from unauthorized access is essential for business executives, policymakers, and users themselves. But strong privacy protection software is often difficult for nonexperts to use. In this Cyber Brief, Sara "Scout" Sinclair Brody explains how promoting and improving open-source software can go a long way toward strengthening privacy online.

See more in Global; Cybersecurity; Privacy

News Release

U.S. Influence Over Cyberspace Is Eroding, Warns Adam Segal in New CFR Book, The Hacked World Order

“While it should continue to promote and espouse the virtues of an open, global, and secure Internet, the United States must prepare for a more likely future—a highly contested, nationally divided cyberspace,” writes Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations, in his new book, The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age.

See more in Global; Cybersecurity; Internet Policy

Research Links

Cybersecurity Policy

How can the United States protect cyberspace, the "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.

See more in United States; Cybersecurity; Internet Policy